From nobody Fri Jan 12 21:37:52 2024 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TBZdd15Cpz56QPB for ; Fri, 12 Jan 2024 21:37:57 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Received: from www.zefox.net (www.zefox.net [50.1.20.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "www.zefox.com", Issuer "www.zefox.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TBZdc6BBkz4bBT for ; Fri, 12 Jan 2024 21:37:56 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Authentication-Results: mx1.freebsd.org; none Received: from www.zefox.net (localhost [127.0.0.1]) by www.zefox.net (8.17.1/8.15.2) with ESMTPS id 40CLbrn0017326 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Fri, 12 Jan 2024 13:37:53 -0800 (PST) (envelope-from fbsd@www.zefox.net) Received: (from fbsd@localhost) by www.zefox.net (8.17.1/8.15.2/Submit) id 40CLbrk2017325; Fri, 12 Jan 2024 13:37:53 -0800 (PST) (envelope-from fbsd) Date: Fri, 12 Jan 2024 13:37:52 -0800 From: bob prohaska To: Mark Millard Cc: freebsd-arm@freebsd.org Subject: Re: USB-serial adapter suggestions needed Message-ID: References: <55AC6824-587D-4C67-B64B-2045A1112F69@yahoo.com> <041F74B4-3D44-4364-9EBD-9F21A4F3B313@yahoo.com> <902798B1-2B66-4ECD-BDAC-195C85066FE6@yahoo.com> <8B4C76B2-707E-4978-9CB3-5D547303A7E5@yahoo.com> <482FA770-89E8-42E8-945E-B662AD564AFE@yahoo.com> List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <482FA770-89E8-42E8-945E-B662AD564AFE@yahoo.com> X-Rspamd-Queue-Id: 4TBZdc6BBkz4bBT X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:7065, ipnet:50.1.16.0/20, country:US] On Fri, Jan 12, 2024 at 12:38:30PM -0800, Mark Millard wrote: > On Jan 12, 2024, at 11:18, bob prohaska wrote: > > > On Fri, Jan 12, 2024 at 10:34:11AM -0800, Mark Millard wrote: > >> > >> If you did not specify the signal explicitly, you tried: > >> > >> 15 SIGTERM terminate process software termination signal > >> > >> (I'm not claiming all those "terminate process" signals are > >> likely to be involved. But SIGTERM is need not be involved > >> at all.) > >> > >>> Both the ssh connection from workstation to terminal > >>> server and the su to root needed to run tip survive. > >>> > >>> I should apologize for not testing this sooner, it > >>> was a very easy experiment. If you think of useful > >>> variations please indicate them. > >> > >> See above, in particular SIGHUP . > >> > > > > Just tried SIGHUP several times. The ssh connection didn't > > disconnect. There were also no reports about overriding stale > > locks. > > > > Using SIGKILL reported: > > > > login: Killed > > root@nemesis:/home/bob # > > root@nemesis:/home/bob # tip ucom > > Stale lock on cuaU0 PID=45604... overriding. > > connected > > > > > > FreeBSD/arm (ns2.zefox.net) (ttyu0) > > but the ssh session and su survived. > > > > Finally, I tried SIGSTOP. Again, ssh and su stayed up, but > > restarting tip reported: > > all ports busy > > Power-cycling the usb-serial adpter with usbconfig > > isn't able to free the port. That's new-to-me behavior. > > Deleting the /dev/cuaU0-related files didn't help. > > > > Not sure what to make of this, except that ssh survives > > exit of tip, graceful or not. > > Remember: > > Jan 10 14:29:48 nemesis kernel: ucom_close: tp=0xffffa00001979800 > Jan 10 14:29:48 nemesis kernel: ucom_shutdown: > Jan 10 14:29:48 nemesis kernel: ucom_dtr: onoff = 0 > Jan 10 14:29:48 nemesis kernel: ucom_line_state: on=0x00, off=0x01 > Jan 10 14:29:48 nemesis kernel: ucom_rts: onoff = 1 > Jan 10 14:29:48 nemesis kernel: ucom_line_state: on=0x02, off=0x00 > Jan 10 14:29:48 nemesis kernel: ucom_cfg_close: > Jan 10 15:04:07 nemesis su[35181]: bob to root on /dev/pts/4 > > (and what was somewhat before and somewhat after)? > > What were those messages like (if any) for each of the types of kills? Far as I can tell they're the same following ucom_shutdown. Preceeding ucom_shutdown it looks like the sequence of messages varies a little, but obvious things like the big hex numbers are clearly indentical. If you've got something in mind please tell me what it is and I'll be able to look more intelligently. Thanks for writing, bob prohaska